New Answer / Comment

— Your name

Wait until the fourth day and attack the weak spot with all you got???

Chris G

They are all scammers, they will make you pay after which they will give you an excuse asking you to pay more money, they have ripped me of $2000, i promised i was going to expose them. I figured it all out when my colleague took me to Pavel

(HACKINTECHNOLOGY@gmail.com)

(+1(669) 225 2253)

He did perfect job, he hacks all accounts ranging from (Emails, Facebook, whatsapp, imo, skype, instagram, Phone cloning, DMV removal, tracking locations, background checks Kik etc. he also hacks cell phones, cell phone tapping and cloning, clears bad driving and criminal records, bank transfers, locates missing individuals e.t.c. You should contact him and please stop using contacts you see on websites to execute jobs for you, you can ask around to find a real hacker.

SCOTTY

Get our new designed super intelligent blank ATM cards Which have been specially programmed to withdraw free cash from any ATM Machine worldwide why don’t you get one and enjoy all the best that life has to offer, we sell the original. We deliver the cards to all our customers and interested buyers worldwide in just 3 day and it has changed the life of many people, we have various cards and various prices for them and the cards has various daily withdrawal. To get your card please Contact us via: Email Address: (vanalfons222@yahoo.com) stating the particular card you want order. GET YOUR CARD NOW our email again is (vanalfons222@yahoo.com)..

Van Alfons

I would send 1/3 of my available army to the city, sending the rest to camp near the point and get ready to attack when the defense is broken, and I will keep sending men to the camp so we will hit hard, Alternatively I would evacuate the city, leaving dead corpses all over (inspiration taken from Sherlock) and send all of my available troops to the weak point, or just nuke the weak point assuming I have warheads at my disposal.

Aeksrener

★ COMPOSITE HACKS★

An assumption that I'd have to know how to code to be able to hack was made years back, Though Coding and Programming Is Involved But, Hacking isn't limited to codes, Throughout my daily life, I tend to experience the most complex, uncommon, yet positive solutions to common problems. It's rooted in how I think. I couldn't turn it off if I tried. It's a part of my character that I was born with, not something I learned at school or from books. I sometimes wish that weren't the case. That it was something I could teach. That it was something I could give lessons in, without having to start from scratch in an entire way of thinking that few people would have patience for.

Hacking is not related to specific programming language. Hacking is the idea and mindset And Ability for you to Use various Hack Tools to Break into the Vunurebilities of the Target. For example you can create a key logger program either with C# or python and make it as background process to collect user input. You can Also Hack Into a Target's Electronic Devices Easily With Various Special Hack Tools.Hacking Has Been My Job For over 20 years now of which i Have been making So Much Money From. Some Years Back I Created A Hack Team called COMPOSITE HACKS.

COMPOSITE HACKS is a Team Of Professional HACKERS , a product of the coming together of Legit Hackers from the Dark-Web (pentaguard, CyberBerkut, White Hack and Black Hat,) whose system is a very strong and decentralized command structure that operates on ideas and directives..★ OUR HACKING CAPABILITIES:We Offer Varieties Of LEGIT Hacking Services With the Help Of Our Root HackTools, Special HackTools and Our Technical Hacking Strategies.- Below is a List Of Services we Render Often:★Penetration Testing★ Phishing★ Jail Breaking. ★ Phone Hack: Giving you access to the Target's Call Log, messages, chats and all social media Apps .★Retrieval Of Lost Files★ Location Tracking.★ Clearing Of Criminal Records.★ Hacking Of Server, Database And website e.g Facebook, twitter, Instagram Snapchat etc

★ You can also contact us for other Cyber Attacks And Hijackings, we do almost All.

★Contact Us for Your Desired Service Via: compositehacks@gmail.com

★We Treat Every Request With Utmost Confidentiality★

Nicholas Shields

Do you need hackers for hire? Do you need to keep an eye on your spouse by gaining access to their emails? As a parent do you want to know what your kids do on a daily basis on social networks ( This includes facebook, twitter , instagram, whatsapp, WeChat and others to make sure they’re not getting into trouble? Whatever it is, Ranging from Bank Jobs, Flipping cash, Criminal records, DMV, Taxes, Name it,i can get the job done. accesshacking a professional hacker with 10 Years+ experience.Contact Accesshacking@gmail.com

mark

Evacuate city and attack

CYBER ULTIMATE HACKS Cyber ultimate hacks is a legit hack team specially equipped with the solution you've been searching for. We specialize in all type of cyber attacks and bullies such as:

#TRACKING GPS location of cars, Computers, Phones (Apple, windows and Android), e.t.c. We also track E-mail addresses, Social media such as Facebook, Twitter, Skype,Instagram Snapchat etc. #RECOVERY of Passwords for E-mail address, Phones, Computers, Social media Accounts, Documents e.t.c. #INSTALLATION of Spy ware so as to spy into someone else's computer, phone or E-mail address thereby giving you access to the Target’s Call Log, messages, chats and all social media Apps and also Installation of Spy ware software on your individual O.S to know if your Gadget is being hacked into.. We also Create and Install VIRUS into any desired computer gadget.

NOTE: We also specialize in clearing of CRIMINAL RECORDS of diverse types.

* We assure you that your Job will be attended to with care and efficiency as it will be done in no delayed time.

#There's also a forum where you can get yourself equipped with Advanced hacking Knowledge and Also if you're Good with Hacking and you think you can Join our Team of sophisticated hackers, you're welcome as well... CYBER ULTIMATE HACKS gives you the Best service in the Hacking world. Write us on*Cyberultimatehacks@gmail.com*Cyberultimatehacks@protonmail.com

Danny Brian

★COMPOSITE HACKS★

If Truly you Are In Need Of A PROFESSIONAL LEGIT HACKER Who Will Get Your Job Done Efficiently With Swift Response, Congratulations, You Have Met the Right HACKERS.

★ WHO ARE COMPOSITE HACKS???• We are a Team Of Professional HACKERS , a product of the coming together of Legit Hackers from the Dark-Web, (pentaguard,CyberBerkut, RedHack , Black Hat, White Hack ) we have been existing for over 12years, our system is a veryStrong and decentralized command structure that operates on ideas and directives.

★ JOB GUARANTEE: • Frankly speaking, I always give a 100% guarantee on any job we are been asked to do, because we have always been successful in Almost all our jobs for over 12years and our clients can testify to that .To hack any thing needs time though, but we can provide a swift response to your job depending on how fast and urgent you need it.Time also depends on what exactly you want to hack and how serious you are.Enough time with social engineering is required for hacking.So if you want to bind us in a short time, then just don't contact us because We can't hack within 30minutes,*sorry*.Basically, time depends on your luck.If its good luck, then it is possible to hack within 30minutes but, if it is in the other way round, it would take few hours.I have seen FAKE HACKERS claiming they can hack in 30min, 20min , but there is no REAL HACKER who can say this (AVOID THEM).Please Note : we have only one contact email : compositehacks@gmail.com

We will be happy to have you join over 2000 satisfied clients around the world to use our services.

★ OUR HACKING CAPABILITIES:There are so many Reasons why people need to hire a hacker, It might be to Hack a Websites to deface , retrieve information, edit information or give you admin access Some people might need us for Hacking any smart phone giving you access to all activities onthe phone like , text messages , call logs , Social media Apps and other informations.Some might need to Hack a Facebook , gmail, yahoomail, Instagram , twitter and every other social network Accounts, Some might need to Hack into Court's Database to Clear criminal records.However we can also Hack into school's websites (server) to change grades without any trace, Also Some Individuals might want to Track someone else's Location probably for investigation cases. All these Are what we can get Done withing few hours.

★ SOME OTHER SPECIAL SERVICES WE OFFER:★ Hacking and sales of Programmed credit cards & CREDIT CARD TOP-UP★ Sales of untraceable phones (even the pentagon can not track our phones)★ Sales of Tutorial packs for Beginner Ethical Hackers.

★ You can also contact us for other Cyber Attacks And Hijackings, we do almost All.

★Contact Us for Your Desired Service Via: compositehacks@gmail.com

★We Treat Every Request With Utmost Confidentiality★

COMPOSITE HACKS

move everyone to a safe area outside of city save a few guards wait for the enemy to attack then attack their army from the rear

Move everyone in every city into the one city closest to were you will attack them and give every citizen a gun then, hold off the enemy with your military (keeping the squad that will attack the enemy on the sidelines) then attack in a further 5 days

Aiden

Ask the people to move into other cities in five days, using remaining five days, the defense troop will arrive to their weak spot and attack them.

riya

kill yourself so you dont have to worry about it

michael akiss

Considering they need to defend at the 10 days, you can be almost 100% sure they are not using their full force to attack you. You also know when they are attacking down to the day. As such, I would develop a strategy using our full military strength to destroy the opposing force. During the five days to prepare for the attack, I would also demand preparations for an an attack. After a successful defense, send 50% of your military to a frontal attack, 35% to attacking the single spot, and the remainder as reinforcements

We should weak their strong point with full attack. Then there will be full weak point.

While we are defending send our best solider s to attack their weak spot

we know the quantity of soldiers attacking... right?1. If it is below our numbers. defend then with the remaining troops... attack the weak spot.

This covers the chance that this is data is fake.2. If they outnumber us... leave some troops to defend the city while we attack their weak spot. Sure we will loose the city, but we expanded the front into their lines and we can counterattack from the back and liberate many more cities than we will have lost.

In any case, we will call for reinforcements. especially on breaching day.

Quintessence of Quiet

Move everyone from the city they are going to attack and prepare them for the tenth day

Jbo Dudley

The information is useful. The most efficient course of action is to attack on that single spot in the opponent's defense the soonest time possible so as to weaken it and prevent its attack to my cities

Attacker

Hello viewers, it is unfortunate that our secret fraternity have become what most people now use as there aim of getting money, I would say sorry to those who have falling to the once who claim of being an agent of our secret fraternity called Illuminati, any Illuminati member who doesn't show you his or her identity card is a fake and besides avoid those claiming a real agent on facebook there is no real agent on facebook due to the issue of fraudulent. The Illuminati is mainly from Egypt and Kenya, and note that our present head office is now in USA, it is no longer in UK again due to the fraudulent that are now existing there. there are only five agent which was recently send to Nigeria to establish the church of Lucifer over here. And the other thing is that we the real Illuminati are scarce and very have to identify , you can only identify us with our email address and our head office cellphone number which is +1205-390-1290 and our email ID which normally include "666" on it, and please for those who haven't yet be scammed and are willing to join, please be careful cos there are alot of fraudsters and so many imposter now who claims they are real. So now I will want those who are interested to hit this email address: illuminatiword0666@gmail.com , for the link on how to join our fraternity or hit us a message on our whatsapp with this number +2348119239306 for quick conversation on how to start. And there are still alot of fraudsters on whatsapp now and please you shouldn't add anyone on facebook or email any how, make sure you are terrified with it before you make any attempt, so be careful and also please beware of fraudsters..

Szandor Lavey

Reinforce while preparing to attack

Will

Hypothetical

Time and intelligence is everything in war. Regardless of the fact that there isn't enough information to make a choice yet. METT-TC(Enemy-force size, capability, equipment, experience, tactics, terrain, weather mission etc). That reality aside. You plan hard to protect the city in 5 days...destroy the enemy with shock and overwhelming force and power. The hit should be complete with minimum loss to the next stages, future fighting power. The enemy will change tactics for the defense in 10 days due to confusion about intelligence having being exploited. The total damage to moral, loss of life, and equipment and chaos of the surprise will allow exploitation of the follow on attack towards the enemies weakened circumstance. Shake them, then hit them until they reorganize. Prepare for counter attack and keep eyes and ears always on the enemy.

Seth

I will do nothing in the city. And prepare my forces to attack in ten days. If I would evacuate the city I would alert my enemy about lost codes. Ultimate victory requires the deaths of the people in that city.